Question No: 221 – (Topic 9)

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)

A dial plan.

A server certificate

A transport rule

A data loss prevention (DLP) policy

A call answering rule

Answer: A,B Explanation:

Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

A: Use the EAC to configure Protected Voice Mail from authenticated callers

->In the EAC, navigate to Unified Messaging gt; UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit.

->On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit.

->On the UM Mailbox Policy page gt; Protected voice mail, under Protect voice message from authenticated callers, select one of the following options:

->Click Save.

B:

In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are

used on the Client Access server and the Mailbox server both must contain the local computer#39;s fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers.

Question No: 222 – (Topic 9)

You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 Client Access servers.

The Exchange Server 2007 Client Access servers must be configured to use the Exchange Server 2013 Client Access server. We do this by setting the AutodiscoverServiceInternalURI property.

Question No: 223 HOTSPOT – (Topic 9)

You need to recommend a database availability group (DAG) design that meets the technical requirements.

Which DAG design should you recommend?

To answer, select the appropriate design in the answer area.

Answer:

Question No: 224 – (Topic 9)

You need to recommend a solution for the memos. The solution must meet the compliance requirements.

What should you include in the recommendation?

Secure/Multipurpose Internet Mail Extensions (S/MIME)

Information Rights Management (IRM)

Domain Security

Data loss prevention (DLP) policies

Answer: B Explanation:

Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization#39;s messaging policies and applied using transport protection rules or Outlook protection rules.

Reference: Information Rights Management

Question No: 225 DRAG DROP – (Topic 10)

You need to create a federation trust for the planned organization relationship. Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Question No: 226 DRAG DROP – (Topic 10)

You need to recommend which tasks must be performed to meet the compliance

requirement for the marketing department. Which three actions should recommend?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Question No: 227 – (Topic 10)

You implement the UM pilot.

You capture and analyze a network trace from the IP-PBX.

You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped.

You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 2013 organization.

What should you do?

Modify the IP-PBX to route calls to EX5 and EX6.

Modify the port used on the IP-PBX.

Modify the SIP listening port on EX1.

Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.

Answer: A

Question No: 228 – (Topic 10)

You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.

Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)

/ Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso.

/ On-premises users must be able to share free/busy information and calendar information with the Office 365 users.

A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it#39;s configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.

B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365

Question No: 229 – (Topic 10)

You are evaluating the implementation of the organization relationship.

You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users.

What should you recommend doing before implementing the organization relationship?

Question No: 230 – (Topic 10)

You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys.

Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)

Run the set-transportserver -transportsyncenabled $true command.

Run the set-transportconfig -tlsreceivedomainsecurelist tailspintoys.com command.

Run the set-transportservice -transportsyncenabled $true command.

Create a new Receive connector.

Create a new Send connector.

Answer: B,D Explanation:

Scenario:

Secure all of the email messages from the users at Tailspin Toys to the Contoso users. Ensure that all of the messages can be secured if the certificates at Tailspin Toys are issued by a trusted third-party certification authority (CA).

Configuring Domain Security on Exchange Server 2013

Establish certificate trust between organizations

Configure Domain Security

TLSReceiveDomainSecureList – specifies the domains from which you want to receive domain secured email by using mutual Transport Layer Security (TLS) authentication.